Preparation Checklist
Task |
Description |
Timeline |
---|---|---|
Production DNS Records
|
Determine if DNS records will need to be modified post migration. If Persistent Agents are deployed using GPO or a software management program, note the following:
Due to the above, both the Application Server and Control Server FQDNs will need to resolve to the Control Server eth0 IP address.
|
Any time prior to starting the migration. |
README and NOTES Files
|
Check for the existence of README or NOTES files in the CentOS appliances. Log in to the CentOS appliance CLI as root and type:
If either a README or NOTES file exists:
|
Any time prior to upgrading software. |
Software Upgrade
|
Upgrade all CentOS appliances to the required version (see Requirements).
For instructions, refer to the OS and Software Upgrade Cookbook.
|
Several days prior to starting the migration. |
Product Registration (Step 1) /Endpoint License Entitlements Transfer (Step 2)
|
New products must be registered prior to requesting entitlements transfer. These steps do not affect current functionality. |
Two weeks prior to the maintenance window.
|
Maintenance Window Planning
|
If FortiNAC is already managing network access, a maintenance window is required to perform the last two migration steps (Collect & Transfer CentOS Migration Data and Cutover). During this time:
Recommend at least a 4 hour maintenance window to complete the data migration and validation of the following functions:
|
Recommend at least a 4 hour maintenance window |
Preparation Checklist – Features Requiring Access Configuration
FortiNAC-F systems have limited inbound access by default. In order for certain features to work properly, access must be allowed by setting the “allowaccess” command.
See chart below to determine which options will be required based upon the FortiNAC features currently in use.
-
Confirm if feature is configured using the Related FortiNAC UI View (if applicable). Click on the path to open the Admin Guide for more details on the view.
-
Use the Required column to mark those features.
Note: Certain features are already marked as required: SSH, SNMP, HTTPS access for the Admin UI
For additional details, see Open ports in the Administration Guide.
Related Feature
Required
Related FortiNAC UI View
<“set allowaccess” option> / <port>
PING is used by administrators to verify IP contact with FortiNAC eth0 and eth1
N/A
ping / port1 and port2
SSH
X
N/A
ssh / port1
Isolation scopes & Captive Portal
System > Config Wizard > Summary
* "Valid SSL Certificate" is the only optional available as of v9.4.5, vF7.2.4 and above. SSL certificate will be required for the portal certificate target.
dhcp / port2
dns / port2
https / port2
DHCP Fingerprinting
dhcp / port1
Network Device Management
X
snmp / port1
Device Change Notification from IPS/IDS devices using syslog
syslog / port1
Endpoint Connectivity Notification using syslog (e.g. FortiGate)
N/A
syslog / port1
High Availability
nac-ipc / port1
FortiNAC Manager
FortiNAC Manager GUI Dashboard > Servers widget
nac-ipc / port1
Local RADIUS Server mode
radius-local / port1
Proxy RADIUS mode
radius / port1
Proxy RADIUS Mode using accounting
radius-acct / port1
Persistent Agent
nac-agent / port1 & port2
Fortinet Security Fabric (FSSO)
fsso / port1
Admin UI (port 8443)
Control Manager (M): Manage FortiNAC Servers
X
https://<FortiNAC hostname or IP>:8443/
https-adminui / port1
Admin UI (port 8080)
http://<FortiNAC hostname or IP>:8080/
http-adminui / port1
Network Sessions
netflow / port1
-
List the required options from the table above to chart below. Refer to this table during the Appliance Configuration step.
Example:
Feature Requirements:
PING (ports 1 & 2)
SSH
Isolation scopes & Captive Portal
DHCP fingerprinting
Network Device Management
High Availability
Admin UI (port 8443)
port1: set allowaccess ping ssh dhcp snmp nac-ipc https-adminui
port2: set allowaccess ping dhcp dns https
Port
Syntax
port1
port2